Global surveillance by category


This is a category of disclosures related to global surveillance.

Court orders, memos and policy documents

The following table describes what is known about the below SIGINT Activity Designators. It is not presumed to be complete.
DesignationCovernameParent ProgramLegal AuthorityKey TargetsType of Information collectedAssociated DatabasesRemarks
US-3140
MADCAPOCELOTSTORMBREWEO 12333
  • The country of Russia
  • European Terrorism
  • DNI
  • metadata through:
  • *XKEYSCORE
  • *PINWALE
  • *MARINA
  • PINWALE
    MARINA
    US-983
    STORMBREWSTORMBREWGlobal
    "Key corporate partner with access to international cables, routers, and switches"
    US-3206MONKEYROCKETOAKSTAREO 12333Counterterrorism in the Middle East, Europe, and AsiaDNI metadata and content
    • "Foreign access point"
    • was expected to go online in spring 2012.
    US-3217SHIFTINGSHADOWOAKSTAR
    • Afghanistan communications:
    • *MTN Afghanistan
    • *Roshan GSM Network
    • *AWCC
  • DNR metadata and voice
  • "Timing Advances"
  • geolocation
  • "Foreign access point"
    US-3230ORANGECRUSHOAKSTAR"To be determined"
    • Voice
    • Fax
    • DNI
    • DNR
    • Metadata
  • "Foreign access point through PRIMECANE, and 3rd party partner"
  • not online as of the time of source presentation.
  • US-3247YACHTSHOPOAKSTARWorldwide DNI MetadataWorldwide DNI MetadataMARINA"Access through BLUEANCHOR partner"
    US-3251ORANGEBLOSSOMOAKSTAR
    US-3257
    SILVERZEPHYROAKSTAR
    Transit Authority

    FAA
    South, Central and Latin America
    • DNR
    • *metadata
    • *voice
    • *fax
    • DNI
    • *content
    • *metadata
    "Network access point through STEELKNIGHT partner"
    US-3277BLUEZEPHYROAKSTAR
    US-3354COBALTFALCONOAKSTAR
    US-984XNPRISMIt is possible, though not directly proven that PRISM falls under the umbrella of BLARNEY, given similar designations.Known Targets include
  • Venezuela
  • *Military procurement
  • *Oil
  • Mexico
  • *Narcotics
  • *Energy
  • *Internal Security
  • *Political Affairs
  • Colombia
  • *Trafficking
  • The exact type of data varies by provider:
  • Email
  • Chat – video, voice
  • Videos
  • Stored data
  • VoIP
  • Filer transfers
  • Video Conferencing
  • Notifications of target activity, logins, etc.
  • Online Social Networking details
  • Special Requests
  • TRAFFICTHIEF
    MARINA
    MAINWAY
    FALLOUT
    PINWALE
    CONVEYANCE
    NUCLEON

    • Accounts for 91% of collection under FAA702 authority.
    • Cooperation between the NSA and internet companies, whereby the companies allow the NSA access to their servers.
    • List of PRISM partners: AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, and Yahoo!.
    • Newsletters referencing millions of dollars in payments to Prism partners by SSO, reimbursing them for their costs.
    US-984BLARNEYBLARNEYFISA
    • Counter Proliferation
    • Counter Terrorism
    • Diplomatic
    • Economic
    • Military
    • Foreign Government
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
  • Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
  • US-984XBLARNEYBLARNEYFAA
  • Counter Proliferation
  • Counter Terrorism
  • Diplomatic
  • Economic
  • Military
  • Foreign Government
  • DNI Strong Selectors
  • DNR Strong Selectors
  • DNI Circuits
  • DNR CircuitsMobile Wireless
  • FISA Court authorized communications
  • FISA Court authorized communications
  • Known facilities:
  • AT&T's Room 641A in San Francisco, California
  • AT&T site in New Jersey
  • US-990FAIRVIEWFAIRVIEWTransit Authority
    FAA
    Global
    • DNR
    • DNI
  • Key corporate partner with access to international cables, routers and switches.
  • Cyber access.
  • US-3105S1DARKTHUNDERSSO Corporate/ TAO Shaping
  • TAO refers to Tailored Access Operations, namely hacking.
  • US-3105S1STEELFLAUTASSO Corporate/ TAO Shaping
  • TAO refers to Tailored Access Operations, namely hacking.
  • Note: SIGADs not otherwise designated are presumed to operate under the legal authority of Section 702 of the FISA Amendments Act
    The Government Communications Headquarters is the main British intelligence agency responsible for providing signals intelligence and information assurance to the British government and armed forces.

    Encryption

    In cryptography, encryption is the process of encoding information in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. According to Snowden's recommendations published by The Guardian Edward in September 2013, properly implemented strong crypto systems were among the few things which one can rely on. However, endpoint security is often too weak to prevent the NSA from finding ways around it.

    Underground bunkers

    In September 2013, it was reported by the press that a number of countries deemed by the US and its allies to be rogue states, such as Syria, Iran and North Korea, had successfully evaded U.S. government surveillance by constructing secret bunkers deep below the Earth's surface.
    China's underground megaproject, the 816 Nuclear Military Plant in Chongqing, was reported to be "most worrying" for the U.S. Defense Intelligence Agency.
    Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.

    Unrelated to Edward Snowden